A chosen IV attack against Turing

7Citations
Citations of this article
23Readers
Mendeley users who have this article in their library.

Abstract

In this paper, we show that the key scheduling algorithm of the recently proposed stream cipher Turing suffers from important flaws. These weaknesses allow an attacker that chooses the initialization vector (IV) to recover some partial information about the secret key. In particular, when using Turing with a 256-bit secret key and a 128-bit IV, we present an attack that requires the ability to choose 237 IV and then recovers the key with complexity 272, requiring 236 bytes of memory. © Springer-Verlag Berlin Heidelberg 2004.

References Powered by Scopus

Correlation-Immunity of Nonlinear Combining Functions for Cryptographic Applications

581Citations
N/AReaders
Get full text

Weaknesses in the key scheduling algorithm of RC4

514Citations
N/AReaders
Get full text

Fast correlation attacks on certain stream ciphers

401Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Cube attacks on tweakable black boxp Polynomials

350Citations
N/AReaders
Get full text

On the security of IV dependent stream ciphers

24Citations
N/AReaders
Get full text

Cryptanalysis of loiss stream cipher

5Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Joux, A., & Muller, F. (2004). A chosen IV attack against Turing. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 3006, 194–207. https://doi.org/10.1007/978-3-540-24654-1_14

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 15

71%

Professor / Associate Prof. 3

14%

Researcher 2

10%

Lecturer / Post doc 1

5%

Readers' Discipline

Tooltip

Computer Science 18

90%

Physics and Astronomy 1

5%

Mathematics 1

5%

Save time finding and organizing research with Mendeley

Sign up for free